Test Scenario for Export to Excel Functionality!
Generally Reports are exported to excel.
broad scenarios of this are as follows
1. when some data is exported to excel, an excel sheet should open in next tab. A windows dialogue with two options – Save or open should appear.
i) Save- document should be saved to browsed location in correct format.
ii)Open- document should open in next tab/window
2. Verify name of the document – opened or saved
3. Check if all data is transferred successfully- Compare data in excel with the data on webpage. No garbage values or encoded values should appear on excel
4. Verify if complete data is transferred. Check this in accordance with the maximum rows allowed in an excel sheet (this will vary according to different versions of MS EXCEL)
5. verify if datatypes formats are correct in excel.
6. If graphs or pie charts are being exported verify size /color of the same.
7. Verify functionality with different versions of MS EXCEL
consider for example you have exported the report .
8. whether the report data and the data in the export data sheet are same and also in same format.
9. the column order should also be same
10. the values that is if any round upto 2,3 decimals should also be same as in case of reports( some times it happens that in report u get the rounded data wheras in export you get the direct darta.
11. You can also perform data validatuion testing on export if you have not done that on report i.e
fire a sql on the data base and get the result for that report, n export the report and compare the sql data with the exported data( use formulas in excel for comparison)
Test cases for testing the Triangle
Test Case for a Triangle:
- Check if the triangle is equilateral or isosceles or scalene
- Check It must be a closed figure.
- Check the figure must contain only 3 sides which are straight and only 3 angles.
- Check 2 sides must be passing through each vertex.
- Check the sum of all 3 angles must be 180 degrees.
- Check all sides should be same in length for equilateral
- Check only 2 sides should be same for isosceles triangle.
- Check if 1 angle is 90′ then it is right angled.
- One/Two/Three sides of a triangle is 0.
- Check if the sides are coinciding or not
- Check if the triangle is right-angled isosceles, there
is a right angle or not. - if the triangle is acute or obtuse or right-angle.
- Check if the triangle is isosceles, the opposite angles
are equal or not. - Check if the triangle is equilateral, all the angles are
equal or not [i.e., 60degrees]. - Check if the user is able to draw the 3 circles
[interior, exterior, circumcircle ]
Security testcases for Login window
Security testcases for login window for website:
Reference Internet: Security test cases for login window in web application
Approach: A
1) Invalid Username/password
2) Password encryption (Encrypted Password cannot be copy-pasted in notepad)
3) Forgot Password Link
4) Valid login name/email id for forgot password or contact administrators
5) Checking cookies for username/password
6) Number of invalid attempts for username/password
7) Remember me(for password)
8) In case of financial application (like Bank – Captha, virtual keypad etc.., for ATM – Pin etc..)
9) Authorization
10) Access Control
11) SQL Injection
12) Check the Admin rights to delete the already logged in user.
13) SSL
Approach: B Following are some test cases that you may want to execute to check the login level security of any web application :
1- Check if the user can access the secured area of the application without proper login.To do this, you may book mark, add to favourite or copy the URL of any secured area page and then run the URL directly without login.Application should not allow the access to the secured area in this case.
2- Check if the user can work with the secured area page, that is accessed by using browser’s BACK button, after log out the application.Proper info message should be displayed in this case mentioning that user needs to be logged in the application.
3- Check if the user can work in secured area after session time is out.
4- Check if multiple users, with the same login ID & password can access the application.
Approach: C In Security Testing you will also check for below:
1. Check data is travel in network in plain text or Encrypted form
2. Check data encryption for login id & Password is fixed encryption or random encryption
3. Check if you are using Certificated, that certificate will follow trust chain or not
4. Log File for both web page & database
5. Client side validation is required for each text filed
6. Error Message does not contain malicious info so that hacker will use this information to hack web site
Source Internet:
http://www.scribd.com/cazanova20/d/16651354-security-test-cases
Functional test cases for bluetooth device..
Test cases for Bluetooth.. 1) Functional testing is used to test a Bluetooth chip for a specific use, such as audio Capabilities or data transfer. 2) User can able to search all available devices on the range; a master Bluetooth device can communicate with a maximum of seven devices. 3) Both data and voice transmissions can be sent and received through the use of short range networks. 4) Bonding is the creation of a link key between two devices. The relationship is created when the link key is exchanged between two devices. 5) User can able to disconnect any time. 6) While closing Bluetooth ask to disconnect the present connections. 7) Bluetooth maximum range is 10 meters. 8) Communications protocol primarily designed for low power consumption, with a short range as long change the distance power consumption is higher. 9) The effective range varies due to propagation conditions, material coverage, production sample variations, antenna configurations and battery conditions. 10) Bluetooth allows multiple devices to communicate with a computer over a single adapter. 11) Through the use of a mobile phone you can send pictures, videos, exchange business cards and also transfer files to your PC. 12) (Device paired) this is a message used to confirm that a user has successfully paired two Bluetooth devices. 13) Authentication - The process of verifying the identity of the other end of a communications link. In Bluetooth technology this is achieved by the authentication process based on passkeys and pairing. 14) Devices not found, this is an error message which may appear if a search for other devices in range does not find anything. 15) Idle Mode, a device is in idle mode when it has no established links with other devices. In this mode a device may discover other devices. 16) Inquiry Procedure, the inquiry procedure allows a device to discover other devices within range. 17) Known Device, a device which is already known about by another device. Either the devices have been paired in the past or some information of the known devices is stored. 18) Non-discoverable mode, a device that will not respond to discovery requests. 19) Non-pairable mode, a device that will not accept pairing is said to be in non-pairable mode. 20) Passkey, a passkey is a user-defined password needed to connect to a device from any other device. It is strongly advised to use passkeys wherever possible to avoid unauthorized access to your Bluetooth devices. 21) Unknown Device, a device that is not currently paired with the local device, and has not been paired with it before or no information about the device is stored.
Functional test cases for address book
Test cases for address book.
1) User can successfully add new contact to address book
2) Duplication of contact is identified.
3) User can successfully delete the required Contact.
4) User can view the contacts from the Alphabetic order
5) User can manually search by entering the search criteria. From the search menu option.
6) The search should be as appropriate as possible with accurate results
7) Add more than 100 records and see if the variables used accept more than 100 users,
sometimes using default data types gives this error.
8) User can able to update the existing user info and ask conformation to the user.
9) Check the validations and mandatory fields.
10) User can able to read new as well as existing users in contacts.
Test case for online purchasing…
Test Case/Scenario for online purchasing.
1)click the URL link for the online purchasing site.
2)Register if not registered before, Enter user name,login id and password, Click ‘OK’ button to submit.
3)Enter your login id and password,if you are a.
4)Validate the login id and password, if correct menu page will be opened.
5) If not correct,display the error message “invalid login id or password”Re-enter your login id and password.
6)Click the item field and select the item.
7)If available, display the cost and brand, else display ” item is unavailable”.
8)click ‘YES’ to do online purchasing for the item else click ‘NO’.
9)If ‘YES’ go to the payment type, else display the ‘EXIT’ page.
9a) Enter shipping address where all the fields are mandatory
9b)Enter billing address
9c) Enter message to be given to the consignee
9d) update shopping cart and proceed to payment
10)click the payment type options and select the mode of payment.
11)Fill the fields- account holder’s name, bank name, credit/debit card option, card detail, price to be paid, email id etc.
12) If invalid information is given, show error message ” please re-enter “
13)If black field is present, display message “all the fields are mandatory”.
14)Click “SUBMIT” button.
15)Display the successful submission message “successfully completed”.
16)Press ‘EXIT’ button.
17)Show the message ” successfully logged off”.